ISO 27001 Lead Implementer Certification

Description

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on
ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.

Course Objectives

At the end of this course, the participant is expected to:

Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks

Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS

Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization

Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS

Acquire the expertise to advise an organization in implementing Information Security Management System best practices

Course Outline

Day 1 – Introduction to ISO/IEC 27001 and initiation of an ISMS

Course objectives and structure

Standards and regulatory frameworks

Information Security Management System (ISMS)

Fundamental principles of Information Security Management Systems

Initiating the implementation of an ISMS

Understanding the organization and clarifying the Information Security objectives

Analysis of the existing management system

Day 2 – Plan the implementation of an ISMS

Leadership and approval of the ISMS project

ISMS scope

Information Security policies

Risk assessment

Statement of Applicability and top management`s decision to implement the ISMS